added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T20:51:13.690055+00:00
1,576,629,570,000
67235d74ea21d9a66f0a7574876a7c5ba58bacda
2
{ "blob_id": "67235d74ea21d9a66f0a7574876a7c5ba58bacda", "branch_name": "refs/heads/master", "committer_date": 1576629570000, "content_id": "565d9eb2f42f358d437ecc0893ee28f049e1e0f6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bde08ac2ac8790a57cac218eddb58a1dc5dd6725", "extension": "py"...
2.421875
stackv2
import os import datetime import logging.config import traceback as tb import io from flask import request, jsonify, make_response import json # it MUST be included after flask! import inspect from appdirs import user_config_dir from pythonjsonlogger import jsonlogger from lxml import etree from xml.etree import Elem...
201
32.21
93
16
1,475
python
[{"finding_id": "codeql_py/stack-trace-exposure_86d5d3822181ef95_3afa4b8e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 61 ]
[ null ]
[ 34 ]
[ 35 ]
2024-11-18T21:13:57.177504+00:00
1,578,895,518,000
4b338a79617b61817baa36c2a6f44a3c169fa2d3
3
{ "blob_id": "4b338a79617b61817baa36c2a6f44a3c169fa2d3", "branch_name": "refs/heads/master", "committer_date": 1578895518000, "content_id": "4f00b2ba0f831f4d0ec125aa6a0be18729e77727", "detected_licenses": [ "MIT" ], "directory_id": "8f280c552f2e304649661503e7aa41922ed6ee46", "extension": "py", "fi...
3.0625
stackv2
import re import os.path from os import path # Define a function for # for validating an Email def check_email(email): # Make a regular expression # for validating an Email regex = "^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$" if (re.search(regex, email)): return True else: retur...
21
20.05
59
8
119
python
[{"finding_id": "codeql_py/redos_7321d03688f0753e_4f910a54", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 10, 10 ]
[ null, null ]
[ 25, 41 ]
[ 28, 44 ]
2024-11-18T21:14:01.091364+00:00
1,611,416,994,000
2472e22d67ce45b0c4b9ef03d4fcc53b1b8e7c99
3
{ "blob_id": "2472e22d67ce45b0c4b9ef03d4fcc53b1b8e7c99", "branch_name": "refs/heads/master", "committer_date": 1611416994000, "content_id": "b7309729a76ddd3a5b1b12633359c554b2e11570", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0238d090be16f29e98cf061fd4e1f462532e2c9b", "extension": "py"...
2.671875
stackv2
import sys, datetime from UNP.Core import Account, ActTable class Searcher: def __init__(self, mode="username", start=0, end=100, string="abcdefghijklmnopqrstuvwxyz", list=['ucas']): self.mode = str(mode) self.start = int(start) self.end = int(end) self.string = st...
183
44.5
93
25
2,010
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08e48b5b56dfe078_158623d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 83, 87 ]
[ null, null ]
[ 27, 27 ]
[ 83, 84 ]
2024-11-18T21:14:06.885182+00:00
1,588,248,275,000
216651a31d99823475186b919af4327cfec27b30
3
{ "blob_id": "216651a31d99823475186b919af4327cfec27b30", "branch_name": "refs/heads/master", "committer_date": 1588249224000, "content_id": "a50606b6e3f473bd5ad5dd2021f5269d721a3dff", "detected_licenses": [ "MIT" ], "directory_id": "a8c25798248230e7b8286d12dece103e6fa10f65", "extension": "py", "fi...
2.8125
stackv2
''' Use the Face2Gene library to get syndrome information. ''' import json import os import re import logging import collections from typing import Union import hashlib import requests from requests.adapters import HTTPAdapter from requests.packages.urllib3.util.retry import Retry LOGGER = logging.getLogger(__name__...
191
31.86
79
18
1,427
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_816c3b471964aa9e_654de76f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 182 ]
[ null ]
[ 37 ]
[ 61 ]
2024-11-18T21:14:25.871257+00:00
1,547,079,467,000
0ba403a65164fd0a2b70cc02a81bcb0f77255e7e
3
{ "blob_id": "0ba403a65164fd0a2b70cc02a81bcb0f77255e7e", "branch_name": "refs/heads/master", "committer_date": 1547079467000, "content_id": "d8b641d059b551c9f27dcd97eacde122a186413b", "detected_licenses": [ "MIT" ], "directory_id": "b8cfd1f470504e5ab9b0f5cdb516a318bc8aa354", "extension": "py", "fi...
2.875
stackv2
import logging logger = logging.getLogger(__name__) class RPCException(Exception): pass class RPC(object): def __init__(self, address, username, password): self.address = address self.username = username self.password = password def make_call(self, method, params=[], encoder=None...
35
29.31
90
15
216
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1470aeac878ff819_be547cab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 27 ]
[ 67 ]
2024-11-18T21:14:28.381107+00:00
1,682,621,244,000
2bd79255a62e6dfab54645ca063a08d20d44834f
3
{ "blob_id": "2bd79255a62e6dfab54645ca063a08d20d44834f", "branch_name": "refs/heads/master", "committer_date": 1682621244000, "content_id": "299185576653be0ba1b1f872775e17d6f1f423a3", "detected_licenses": [ "MIT" ], "directory_id": "8bbad14b3a34ec9958c6e529b0e853a47b02cefe", "extension": "py", "fi...
2.640625
stackv2
from base64 import b64encode, b64decode from pbincli.utils import PBinCLIError import zlib # try import AES cipher and check if it has GCM mode (prevent usage of pycrypto) try: from Crypto.Cipher import AES if not hasattr(AES, 'MODE_GCM'): try: from Cryptodome.Cipher import AES ...
327
34.97
134
23
2,811
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e69a509bd04f23c_b9f65489", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 311, 152 ]
[ null, null ]
[ 31, 29 ]
[ 63, 59 ]
2024-11-18T21:14:44.910418+00:00
1,586,073,339,000
da0a4e4c11e3a8500bd5d348e50de44363cfaa2d
3
{ "blob_id": "da0a4e4c11e3a8500bd5d348e50de44363cfaa2d", "branch_name": "refs/heads/master", "committer_date": 1586073339000, "content_id": "824fe1ca4340a34aac68c2293963423dd55fe252", "detected_licenses": [ "MIT" ], "directory_id": "b0ecab74355154fa9b57da66dd1a836ec965ef12", "extension": "py", "fi...
2.984375
stackv2
import newspaper import csv import pandas as pd import re import os import time CREDIBLE = './credible.csv' NONCREDIBLE = './noncredible.csv' OUTPUT = './new_articles.csv' def main(): ''' Runs through all urls from CREDIBLE and NONCREDIBLE, reads articles, then writes to file. ''' credible = pd.re...
72
28.94
84
19
544
python
[{"finding_id": "codeql_py/overly-large-range_f991d2c3e3b11c77_a6e7e0f6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 67 ]
[ null ]
[ 49 ]
[ 52 ]
2024-11-18T20:10:47.312060+00:00
1,585,814,865,000
a8d07f44b5e5f62c514eac70c9a213c623cf280d
2
{ "blob_id": "a8d07f44b5e5f62c514eac70c9a213c623cf280d", "branch_name": "refs/heads/master", "committer_date": 1585814865000, "content_id": "1e36f8fadef86e60e98cc44836d4f49b2d622dae", "detected_licenses": [ "MIT" ], "directory_id": "9817ffbbe360977e75bc89c50a924592c944b58c", "extension": "py", "fi...
2.359375
stackv2
import requests from flask import Flask, request from flask_restful import Resource, Api, abort import werkzeug.exceptions as HTTPStatus import os.path import time import json import threading app = Flask(__name__) api = Api(app) files = {} # files = {'amazon_reviews_us_Electronics_v1_00.tsv.gz' : { 'block-0': ['Node...
295
37.31
142
21
2,491
python
[{"finding_id": "codeql_py/path-injection_db2cdcff4d7b01c4_bb5210c3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
7
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 224, 225, 245, 245, 248, 272, 274 ]
[ null, null, null, null, null, null, null ]
[ 29, 31, 26, 49, 22, 27, 26 ]
[ 37, 39, 29, 52, 25, 30, 29 ]
2024-11-18T20:10:59.083987+00:00
1,658,157,030,000
20532a9f8f328d0221fa9e315f8385b80fd07f17
3
{ "blob_id": "20532a9f8f328d0221fa9e315f8385b80fd07f17", "branch_name": "refs/heads/master", "committer_date": 1658157030000, "content_id": "fd69b7d427d953d3f4a49e7bbb5ad9ab6f76807b", "detected_licenses": [ "MIT" ], "directory_id": "4fe6eb97cbaddec2aae20524fc7bfe577862a43b", "extension": "py", "fi...
2.78125
stackv2
import hashlib import qobuz import requests import time try: from urllib.parse import urljoin except ImportError: # python2 from urlparse import urljoin API_URL = "https://www.qobuz.com/api.json/0.2/" APP_ID = None APP_SECRET = None def register_app(app_id, app_secret=None): """Save the app's id and...
174
25.19
79
13
1,068
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_07d9cdc07d3bd993_17c190a9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 174 ]
[ null ]
[ 24 ]
[ 44 ]
2024-11-18T20:48:09.886322+00:00
1,525,303,844,000
bc14aa5cdfb91f245808c814644a2f55e41018b2
3
{ "blob_id": "bc14aa5cdfb91f245808c814644a2f55e41018b2", "branch_name": "refs/heads/master", "committer_date": 1525303844000, "content_id": "cb2b6efe37d194a60556e012012aef797e34699a", "detected_licenses": [ "MIT" ], "directory_id": "30165a4cb5048ebdfbcbdcc3fc1a971e3b16c9ea", "extension": "py", "fi...
2.71875
stackv2
import hashlib import time from functools import partial from typing import Callable, Optional from web3 import Web3 from web3.contract import Contract from web3.eth import Eth from web3.miner import Miner from web3.personal import Personal from app.utils.decorators import set_state, check_state, check_and_unset_stat...
179
37.74
110
16
1,506
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b7fccfb5358a775b_a58ccf3a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 131, 139 ]
[ null, null ]
[ 58, 35 ]
[ 75, 52 ]
2024-11-18T20:48:13.219896+00:00
1,508,193,948,000
17efa05f0a240e9a48f877944332bec8f257804e
3
{ "blob_id": "17efa05f0a240e9a48f877944332bec8f257804e", "branch_name": "refs/heads/master", "committer_date": 1508193948000, "content_id": "06ce3a2d32a89005e974702507834d0e74eb032f", "detected_licenses": [ "MIT" ], "directory_id": "2eae8f1c58e35d85943ad16bebb68c7bc3b2485c", "extension": "py", "fi...
2.546875
stackv2
from argparse import ArgumentParser from jinja2 import FileSystemLoader, Environment from bs4 import BeautifulSoup as bs import requests parser = ArgumentParser(description='Create hydra sports page') parser.add_argument('--file', dest='filename', required=True, ...
35
29.51
102
13
266
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fab0ae4012373d90_370694ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ 31 ]
[ 12 ]
[ 2 ]
2024-11-18T20:48:27.618219+00:00
1,585,558,556,000
c3aa428c8b2e2653d47bc2a597db130f1ffd0324
3
{ "blob_id": "c3aa428c8b2e2653d47bc2a597db130f1ffd0324", "branch_name": "refs/heads/master", "committer_date": 1585558556000, "content_id": "5c4edfb89779129f91d90edc28ca42f142588531", "detected_licenses": [ "MIT" ], "directory_id": "b473e9b27c76f5452be2be12665a8d79da982a0b", "extension": "py", "fi...
2.5625
stackv2
import json import os import socket import threading from tkinter import * import sys import time from tkinter import ttk from tkinter.tix import ComboBox import redis as redis import requests class tk_t(object): """ 第一个登陆窗口 """ def __init__(self): window = Tk() self.window = window...
243
30.6
134
19
2,273
python
[{"finding_id": "codeql_py/request-without-cert-validation_a72b1e003a8f44e0_e2e16052", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 162 ]
[ null ]
[ 11 ]
[ 75 ]
2024-11-18T20:48:31.712271+00:00
1,502,303,452,000
9ede491f20a95951bfbcd637f59d48cc9537d117
3
{ "blob_id": "9ede491f20a95951bfbcd637f59d48cc9537d117", "branch_name": "refs/heads/master", "committer_date": 1502303452000, "content_id": "49c83715dbeb88829a87689a95b95e741c418ef3", "detected_licenses": [ "MIT" ], "directory_id": "17dd5987219954d678e4f63396b78085fc2bcf27", "extension": "py", "fi...
2.671875
stackv2
import hashlib import datetime as date from flask import Flask from flask import request import json node = Flask(__name__); class Block: def __init__(self,index,timestamp,data,prev_hash): self.index = index self.timestamp = timestamp self.data =data #i should encr...
131
23.87
118
15
784
python
[{"finding_id": "codeql_py/reflective-xss_ab456944eb392d01_348a5286", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88 ]
[ 93 ]
[ 12 ]
[ 12 ]
2024-11-18T20:48:32.817542+00:00
1,597,238,095,000
684aefd37f6ec2d1e2ba67e14da4d8e303939596
3
{ "blob_id": "684aefd37f6ec2d1e2ba67e14da4d8e303939596", "branch_name": "refs/heads/master", "committer_date": 1597238095000, "content_id": "24cd8adb58b6ad73d27a06ff0f941487e0ee0052", "detected_licenses": [ "MIT" ], "directory_id": "16937f66a80c89b0700915ea0ad0649bfa8d10c6", "extension": "py", "fi...
2.515625
stackv2
# -*- coding: utf-8 -*- """Module that contains widgets for managing AiiDA lab applications.""" from subprocess import CalledProcessError import traitlets import ipywidgets as ipw from jinja2 import Template from aiidalab.app import AppVersion from home.widgets import StatusHTML, Spinner from home.utils import load_...
261
41.79
118
18
2,279
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9c30d6fa72ff7e69_81762a2a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 66 ]
[ 74 ]
[ 16 ]
[ 20 ]
2024-11-18T20:48:34.350769+00:00
1,620,090,067,000
6d55fd3c8d7c632ea809a2ed2e95b0a1a163b244
4
{ "blob_id": "6d55fd3c8d7c632ea809a2ed2e95b0a1a163b244", "branch_name": "refs/heads/master", "committer_date": 1620090067000, "content_id": "c06194b52be691cb1887b9ebd258a036ab495b2b", "detected_licenses": [ "MIT" ], "directory_id": "b3544b8617bad8d6a87a7877df5363a1360aa2c4", "extension": "py", "fi...
3.671875
stackv2
def main(): full_name = get_full_name() print() password = get_password() print() email_address = get_email_address() print() phone_number = get_phoneno() print() print("Hi " + full_name.split()[0], "thanks for creating an account.") print("we'll text your confirmation code to th...
63
28.13
91
17
435
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3fc903341b18466f_71b86f84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 11 ]
[ null ]
[ 64 ]
[ 76 ]
2024-11-18T21:25:52.950397+00:00
1,585,270,193,000
c96ddc762cc40162589abdb122e7826695d73a1f
2
{ "blob_id": "c96ddc762cc40162589abdb122e7826695d73a1f", "branch_name": "refs/heads/master", "committer_date": 1585270193000, "content_id": "09619570056f2a7e1d7b4bbc93a91ddafb0cb149", "detected_licenses": [ "MIT" ], "directory_id": "98c6ed9d8ce32bd60cc87ec470c6e5d0ac99dae6", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 import json, re, traceback, shutil, send2trash import pandas as pd from datetime import datetime from collections import deque from bs4 import BeautifulSoup from urllib.request import urlopen from urllib.parse import quote # to correct for instances when listing title is not in ascii encoding ...
248
42.01
153
22
2,233
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_cb8cf6082d89392a_13e7a990", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ethiojobs.net/display-job/', so it ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'ethiojobs.net/display-job/', so it might match more hosts than expected." ]
[ 66 ]
[ null ]
[ 33 ]
[ 70 ]
2024-11-18T21:52:15.930301+00:00
1,550,477,744,000
1f427aeeb7cd418fc6b49562e3c5d98472a6aa35
2
{ "blob_id": "1f427aeeb7cd418fc6b49562e3c5d98472a6aa35", "branch_name": "refs/heads/master", "committer_date": 1550477744000, "content_id": "b4cb1833f475e8edb5996713af2af0292f743701", "detected_licenses": [ "MIT" ], "directory_id": "a73623002d3baeaf5a5b6920e600138580b363bf", "extension": "py", "fi...
2.46875
stackv2
from flask import ( Blueprint, flash, g, redirect, render_template, request, url_for ) from werkzeug.exceptions import abort from flask_wtf import FlaskForm, RecaptchaField from flask_wtf.file import FileField from wtforms import TextField, HiddenField, ValidationError, RadioField,\ BooleanField, SubmitField, ...
76
27.63
77
14
505
python
[{"finding_id": "codeql_py/path-injection_11420710d281c5a2_24253d62", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 57, 62 ]
[ null, null ]
[ 17, 8 ]
[ 32, 12 ]
2024-11-18T21:52:27.325303+00:00
1,521,157,552,000
cc8f9d673e5b85bd4ba24e5a81418f27d354121d
2
{ "blob_id": "cc8f9d673e5b85bd4ba24e5a81418f27d354121d", "branch_name": "refs/heads/master", "committer_date": 1521157552000, "content_id": "07613bb5267733e96b6a20f4d4b1ffe586df7cad", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0a89b43293484fc29da8591820d4a8117c84c988", "extension": "py"...
2.328125
stackv2
from cloudant import Cloudant from flask import Flask, render_template, request, jsonify,make_response import atexit import cf_deployment_tracker import os import json import swiftclient.client as swiftclient from werkzeug.utils import secure_filename import base64 # Emit Bluemix deployment event cf_deployment_tracke...
108
31.93
113
16
789
python
[{"finding_id": "codeql_py/flask-debug_ae61321283a57627_aa09e701", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 108, 87 ]
[ null, null ]
[ 5, 19 ]
[ 51, 27 ]
2024-11-18T20:31:27.155104+00:00
1,510,240,188,000
4f0b3dbd4c826373bec2cf0ce57a15689fe235d9
2
{ "blob_id": "4f0b3dbd4c826373bec2cf0ce57a15689fe235d9", "branch_name": "refs/heads/master", "committer_date": 1510240188000, "content_id": "e49c3749e911c855fdfd8b9335b37138f3575d36", "detected_licenses": [ "Apache-2.0" ], "directory_id": "901b4a5ba3d13202db3d3e4c67151d1bee8279a1", "extension": "py"...
2.328125
stackv2
#!/usr/bin/python3 ''' Gathers endpoints for services from kubernetes-api and generates a haproxy.cfg from it. Since not all endpoints should always be exposed, the endpoints have to be annotated to be considered for haproxy-config generation. The required keywords are domain - The domain-name under which the service i...
496
32.35
100
20
3,553
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_07fae7580e11be77_bb60505f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 230 ]
[ 232 ]
[ 15 ]
[ 26 ]
2024-11-18T20:59:46.990095+00:00
1,515,620,563,000
84c94abe832481fa912d8192f1c696fdea0f61ba
4
{ "blob_id": "84c94abe832481fa912d8192f1c696fdea0f61ba", "branch_name": "refs/heads/master", "committer_date": 1515620563000, "content_id": "a8f20406acfc746c90029fc7ec76c3f17b6af5e7", "detected_licenses": [ "MIT" ], "directory_id": "300fbb2743c512ff8a05f85958dbd4c400876069", "extension": "py", "fi...
3.5
stackv2
#!/usr/bin/env python3 ''' Author: c0llision ''' import math from argparse import ArgumentParser import secrets WORDLIST_FILENAME = "wordlist" DEFAULT_NUM_WORDS = 5 DEFAULT_NUM_CHARS = 4 # charset that results in a password with the lowest possible number of keystrokes on my keyboard: CHARSET = "1234567890qwertyuiopas...
55
34.33
105
13
523
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dd1d182a90323ee4_62d56a29", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 48 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T21:10:29.343244+00:00
1,628,550,733,000
ba47baa8a891f4c67604df3edb97a031fcb851b3
3
{ "blob_id": "ba47baa8a891f4c67604df3edb97a031fcb851b3", "branch_name": "refs/heads/master", "committer_date": 1628550733000, "content_id": "7d1dbde1779e7554435a38be7a2a0b3462b9b8b5", "detected_licenses": [ "MIT" ], "directory_id": "4dffee3dfcd792c8cf77789aba6fb2a352d61f15", "extension": "py", "fi...
2.640625
stackv2
""" See https://cex.io/rest-api """ import hmac import hashlib import time import requests BASE_URL = 'https://cex.io/api/%s/' PUBLIC_COMMANDS = { 'currency_limits', 'ticker', 'last_price', 'last_prices', 'convert', 'price_stats', 'order_book', 'trade_history' } class Api: ""...
194
29.06
145
19
1,374
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9d726606ca60d3ae_1df80e0f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 38 ]
[ null ]
[ 74 ]
[ 97 ]
2024-11-18T21:10:49.221446+00:00
1,624,895,936,000
4223995b56a542d9ae50b5956b5f537473841802
2
{ "blob_id": "4223995b56a542d9ae50b5956b5f537473841802", "branch_name": "refs/heads/main", "committer_date": 1624895936000, "content_id": "f7ae3c7bf5a97046954fb7adeb70e5736bfde139", "detected_licenses": [ "MIT" ], "directory_id": "524b53f7cffbcd26b756704a46be602bbb89c654", "extension": "py", "file...
2.328125
stackv2
import os import string import random import hashlib import subprocess import time import json import secrets from models import db_session from models.users import User from models.tests import Test from models.forums import Forum db_session.global_init('database.db') def hash_password(password): h = hashlib.md5(p...
207
18.98
65
18
1,067
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ccd7d3cb5b4ee520_04cc74e0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 18 ]
[ null ]
[ 18 ]
[ 35 ]
2024-11-18T21:10:51.629988+00:00
1,534,333,609,000
18f32f68fad3a83dba82fca70433ce6bbaf27a15
2
{ "blob_id": "18f32f68fad3a83dba82fca70433ce6bbaf27a15", "branch_name": "refs/heads/master", "committer_date": 1534333609000, "content_id": "847e3930c79d2e7dd202c164173c7ed85ac714de", "detected_licenses": [ "MIT" ], "directory_id": "590c98afd17ca45bf6b10f3744191f0040387e53", "extension": "py", "fi...
2.359375
stackv2
# coding: utf-8 import os import requests import sys from bottle import route, run, static_file, get, post, request, template from dotenv import load_dotenv import speech_recognition as sr reload(sys) sys.setdefaultencoding('utf8') # Load environment file for config. load_dotenv(os.getcwd() + '/.env') @route('/') d...
86
29.44
132
18
684
python
[{"finding_id": "codeql_py/full-ssrf_d240b412e0dedf72_96b01f94", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
3
true
[ "CWE-918", "CWE-022", "CWE-022" ]
[ "py/full-ssrf", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 51, 52, 64 ]
[ null, null, null ]
[ 15, 10, 17 ]
[ 95, 23, 30 ]
2024-11-18T21:10:56.355011+00:00
1,517,375,209,000
012ba072bb4c39834f769b31bcefbbc274f9ef8e
3
{ "blob_id": "012ba072bb4c39834f769b31bcefbbc274f9ef8e", "branch_name": "refs/heads/master", "committer_date": 1517375209000, "content_id": "54e4fba91aa6bb712dbbc49b33a3454be8dea84d", "detected_licenses": [ "MIT" ], "directory_id": "a23f45904788a43cd60b76cf1748b18475b15062", "extension": "py", "fi...
2.859375
stackv2
try: from urlparse import urljoin except ImportError: from urllib.parse import urljoin import os import glob import shutil import threading from time import sleep import requests import img2pdf from bs4 import BeautifulSoup source = [ "https://www.mangatown.com/manga/", "http://www.mangareader.net/" ] ...
201
35.99
170
27
1,809
python
[{"finding_id": "codeql_py/request-without-cert-validation_486141cbde2fcddb_1b54582d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 157 ]
[ null ]
[ 11 ]
[ 54 ]
2024-11-18T21:23:34.115917+00:00
1,631,388,510,000
366bbd97ab714348858a00d9fcf01cc9446fb372
3
{ "blob_id": "366bbd97ab714348858a00d9fcf01cc9446fb372", "branch_name": "refs/heads/main", "committer_date": 1631388510000, "content_id": "f508f69a0180e05abd330a74cdf845576e28f650", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "89a1fc9591f2d0585b2193cf2ba5a34ff1710781", "extension": "py"...
2.65625
stackv2
import os import json from os import listdir from os.path import isfile, join from jinja2 import Environment, FileSystemLoader import inflect p = inflect.engine() templates_folder = './templates/' input_folder = './input/' serveur_template_file = 'app.tpl' home_page_template_file = 'home_page.tpl' def load_file(_fil...
55
24.85
91
15
355
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ef940c21107c274e_c7d1501a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38, 47 ]
[ null, null ]
[ 7, 7 ]
[ 61, 61 ]
2024-11-18T21:23:35.833096+00:00
1,431,387,677,000
2a46281b353a3a374360a00b9385f842c112cccc
3
{ "blob_id": "2a46281b353a3a374360a00b9385f842c112cccc", "branch_name": "refs/heads/master", "committer_date": 1431387677000, "content_id": "c7f77981f6e12d413f513e39c6195a3a0f2946e7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c9f4fa3ee8b41afe54300c4e05bc996e0c2e456c", "extension": "p...
2.5625
stackv2
#!/usr/bin/env python """ A test of a simple qdo server Stephen, Shreyas, and Gonzalo Spring 2015 """ import json import requests from flask import Flask, url_for, make_response import flask app = Flask(__name__) __version__ = "0.1" #------------------------------------------------------------------------- #- Log...
109
33.5
124
16
892
python
[{"finding_id": "codeql_py/insecure-cookie_3fdfbdc56ea2214f_d0e3f2ab", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
5
true
[ "CWE-614", "CWE-614", "CWE-312", "CWE-1004", "CWE-1004" ]
[ "py/insecure-cookie", "py/insecure-cookie", "py/clear-text-storage-sensitive-data", "py/client-exposed-cookie", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "This expression stores [sensitive data (password)](1) as clear text.", "Sensitive server cookie is set without HttpOnly flag.", "Sensitive server cookie is set without Htt...
[ 38, 39, 38, 38, 39 ]
[ null, null, null, null, null ]
[ 9, 9, 44, 9, 9 ]
[ 67, 69, 66, 67, 69 ]
2024-11-18T21:59:02.559208+00:00
1,571,652,665,000
6074ce95f72a99c44678113896728d9015b5e0bd
3
{ "blob_id": "6074ce95f72a99c44678113896728d9015b5e0bd", "branch_name": "refs/heads/master", "committer_date": 1571652665000, "content_id": "34b4a9119a22421d116acc8b22e777af70525db5", "detected_licenses": [ "MIT" ], "directory_id": "567a0bd85d22e3a94ab482b0431619e95a572e38", "extension": "py", "fi...
2.75
stackv2
# Youtube video crawling # /usr/bin/python3 import json import sys import os import argparse import requests as rq from pytube import YouTube as yt, Playlist as pl from bs4 import BeautifulSoup as bs YOUTUBE_URL = 'https://www.youtube.com' # YOUTUBE_DOWNLOAD_URL = 'https://www.ssyoutube.com' SAVE_DIRECTORY = "/Downloa...
154
33.39
98
25
1,216
python
[{"finding_id": "codeql_py/overly-permissive-file_51cd51da162e2158_ee6115a5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 31 ]
[ null ]
[ 13 ]
[ 38 ]
2024-11-18T21:59:04.546212+00:00
1,607,659,155,000
cf0dac9107c32cbd64d80c7892a65b129ba91f60
3
{ "blob_id": "cf0dac9107c32cbd64d80c7892a65b129ba91f60", "branch_name": "refs/heads/master", "committer_date": 1607659155000, "content_id": "0da4b24e54b0f1a2b7fac9faa40c839d0f5b498c", "detected_licenses": [ "Unlicense" ], "directory_id": "8df99d7750096b9c793aa2cca0736a8192ab1fa4", "extension": "py",...
3.453125
stackv2
def main(): chenyang = Wages(21000, 1698.92, 3500) print(chenyang.salary) print(chenyang.YearSalary) print(chenyang.PersonalIncomeTax()) print(chenyang.pretax()) print(chenyang.aftertax()) print(chenyang.afterincome()) class Wages(): def __init__(self, salary, social, special, other...
105
25.48
116
14
840
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b7965ef93de0d98_aaf5bb69", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 6, 7 ]
[ null, null ]
[ 11, 11 ]
[ 26, 30 ]
2024-11-18T21:59:15.710072+00:00
1,508,726,756,000
279438939119e50fc7b2463af5e7bf2d49d88e6b
3
{ "blob_id": "279438939119e50fc7b2463af5e7bf2d49d88e6b", "branch_name": "refs/heads/master", "committer_date": 1508726756000, "content_id": "bd6665c4c23f26872ff4988be15a4a7d355c8b5e", "detected_licenses": [ "MIT" ], "directory_id": "f073d4da7fa70cc3dc63a95a5d506b720934f867", "extension": "py", "fi...
2.53125
stackv2
__author__ = 'sunary' from htmlmin.main import minify from flask import request, Response, make_response, current_app, redirect, json, wrappers, url_for from functools import update_wrapper import gzip import time try: from StringIO import StringIO except ImportError: from io import StringIO class FlaskOpt...
231
36.67
114
23
1,705
python
[{"finding_id": "codeql_py/url-redirection_6698a6f70f3d059f_ace36110", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 126 ]
[ null ]
[ 45 ]
[ 57 ]
2024-11-18T22:11:32.733386+00:00
1,690,748,653,000
b09c30b7ff7c0a99c1ca459c1828815d0d398733
2
{ "blob_id": "b09c30b7ff7c0a99c1ca459c1828815d0d398733", "branch_name": "refs/heads/master", "committer_date": 1690748653000, "content_id": "baf837eb80205a7cfed0da37d1c6807adc86a6f9", "detected_licenses": [ "MIT" ], "directory_id": "7aca190d797fd4f0509d1f14e88418a48fdaeb7e", "extension": "py", "fi...
2.390625
stackv2
""" Created on May 24, 2016 @author: iticus """ import asyncio import datetime import hashlib import logging from functools import partial from typing import Any, Callable import aiohttp_jinja2 from aiohttp import web from aiohttp.web_fileresponse import FileResponse from aiohttp_session import get_session, new_sess...
274
37.14
120
18
2,287
python
[{"finding_id": "codeql_py/url-redirection_e6717680ba352bbf_7c54ffec", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-117" ]
[ "py/url-redirection", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 91, 194 ]
[ null, null ]
[ 30, 66 ]
[ 38, 74 ]
2024-11-18T22:11:38.251862+00:00
1,493,045,968,000
355ebde6399ae97c55d1de3943d202b800248107
2
{ "blob_id": "355ebde6399ae97c55d1de3943d202b800248107", "branch_name": "refs/heads/master", "committer_date": 1493045968000, "content_id": "46edc33acdb30acdf31bbbbf6ace4237d48a715a", "detected_licenses": [ "MIT" ], "directory_id": "3de215098a63d194aee8aeaff430b9f2975d6e88", "extension": "py", "fi...
2.328125
stackv2
import os import pathlib import tarfile import boto3 from botocore.handlers import disable_signing from scipy.io import loadmat from scipy.misc import imread import numpy as np from skimage.transform import resize def list_files(base_path, validExts=(".jpg", ".jpeg", ".png", ".bmp"), contains=None): # loop ove...
149
36.63
104
18
1,348
python
[{"finding_id": "codeql_py/tarslip_55a9d410c93038d8_678874d0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 72 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:11:52.505546+00:00
1,446,863,767,000
a91efbbfce526c267cbdccee94fb4ecc05dd701a
3
{ "blob_id": "a91efbbfce526c267cbdccee94fb4ecc05dd701a", "branch_name": "refs/heads/master", "committer_date": 1446863767000, "content_id": "41af6d7be7a7415bdcf1ee0cbd381c76e13df6fe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a5d430ba44f9bea1a7b995792bba99e2eaadcbe4", "extension": "py"...
2.515625
stackv2
import re from easyspider.spider import EasySpider from easyspider.cron import every class Spider(EasySpider): @every(crontab=["* * * */10 *", "* * */5 * *"]) def on_start(self): print("douban spider start") self.fetch("http://movie.douban.com/", callback=self.index_movie) def index_...
22
35
81
15
192
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_f3142a63f6ecf1ab_1e766a72", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected." ]
[ 16 ]
[ null ]
[ 26 ]
[ 63 ]
2024-11-18T22:23:59.029992+00:00
1,448,228,345,000
29fea9df01a4efc189741e8ee298c2d2ca53e858
3
{ "blob_id": "29fea9df01a4efc189741e8ee298c2d2ca53e858", "branch_name": "refs/heads/master", "committer_date": 1448228345000, "content_id": "78f4ab83020f430a7764faebee8515c95a9c9538", "detected_licenses": [ "Apache-2.0" ], "directory_id": "58a6612055d78a78181c192c8dbc2fbe7e2404c4", "extension": "py"...
2.546875
stackv2
#!/usr/bin/env python """recipy - a frictionless provenance tool for Python Usage: recipy search [options] <outputfile> recipy latest [options] recipy gui [options] recipy annotate [options] recipy (-h | --help) recipy --version Options: -h --help Show this screen --version Show version -a -...
270
24.05
106
23
1,693
python
[{"finding_id": "codeql_py/bind-socket-all-network-interfaces_7317963d23dae2dd_2c09e65f", "tool_name": "codeql", "rule_id": "py/bind-socket-all-network-interfaces", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "'' binds a socket to all interfaces.", "remediation": "", "location": {"...
3
true
[ "CWE-200", "CWE-200", "CWE-079" ]
[ "py/bind-socket-all-network-interfaces", "py/bind-socket-all-network-interfaces", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "'' binds a socket to all interfaces.", "'' binds a socket to all interfaces.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 166, 176, 83 ]
[ null, null, null ]
[ 15, 11, 16 ]
[ 39, 26, 52 ]
2024-11-18T22:24:02.709613+00:00
1,589,267,474,000
72dfdf7285902a903e3003227f218db48f77186a
4
{ "blob_id": "72dfdf7285902a903e3003227f218db48f77186a", "branch_name": "refs/heads/master", "committer_date": 1589267474000, "content_id": "146fd876a1f461a457d81778ec2c8d7eae717457", "detected_licenses": [ "MIT" ], "directory_id": "7e25a6fd522a43660fdc486be2b401ea57df453f", "extension": "py", "fi...
3.71875
stackv2
# https://en.wikipedia.org/wiki/Bulls_and_Cows # pair programed this with kid on 2020/05/02; main code done by me, # focused on clear function/variable naming, top-down functions(divide and conquer), # minimal testable code and detailed verifications. # # this is the game portion, solution is in different file, see bul...
97
24.8
89
14
814
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f2b472ad30357c09_d072feaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 49 ]
[ null ]
[ 13 ]
[ 26 ]
2024-11-18T22:24:07.346789+00:00
1,363,421,996,000
9375b5790c834a99dc0f26b2f12a2922642d8d1c
2
{ "blob_id": "9375b5790c834a99dc0f26b2f12a2922642d8d1c", "branch_name": "refs/heads/master", "committer_date": 1363421996000, "content_id": "83431ab35703d54125404f683c89727ccc432d6d", "detected_licenses": [ "MIT" ], "directory_id": "830e1e8ecb7d3521638ce8ca74df03dd44314c4b", "extension": "py", "fi...
2.4375
stackv2
import logging from datetime import timedelta from urlparse import ( urlparse, urlunparse, urljoin ) import cssutils import DNS import requests from bs4 import BeautifulSoup from django.core.urlresolvers import reverse from django.db import models from django.utils import timezone from Crypto.Cipher impor...
379
29.04
81
24
2,483
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_55d7563285b6cce5_e4f3a058", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 85, 91 ]
[ null, null ]
[ 26, 16 ]
[ 46, 46 ]
2024-11-18T22:24:18.547517+00:00
1,401,758,447,000
1b66ce0852743b15cccb76ce633ad4f9fa568f4a
2
{ "blob_id": "1b66ce0852743b15cccb76ce633ad4f9fa568f4a", "branch_name": "refs/heads/master", "committer_date": 1401758447000, "content_id": "819f0418208acd00fe8b86e06c8a83923e9da711", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4751eb702c2543ca68c0c1444a85d741d5251fcf", "extension": "py"...
2.328125
stackv2
# Copyright 2013 dotCloud inc. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed t...
123
31.53
79
14
949
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3cf786f9cc32d9e8_0d90b6ca", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [index.docker.io](1) may be at an arbitrary position in...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [index.docker.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 51 ]
[ null ]
[ 8 ]
[ 37 ]
2024-11-18T22:24:25.378381+00:00
1,613,791,333,000
f6a5f9a201bfc254746ca4abe2b7c2c0b58977a9
2
{ "blob_id": "f6a5f9a201bfc254746ca4abe2b7c2c0b58977a9", "branch_name": "refs/heads/master", "committer_date": 1613791333000, "content_id": "f593e2207d0034d6cec5d15561ea687d654f627e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81dd8d6f0f1ccb1ef17d4a9be6369d673f299e43", "extension": "py"...
2.390625
stackv2
#!/usr/bin/python #!coding=utf-8 import telnetlib import time import threading import sys import os import yaml import argparse class ConfigBackup: def __init__(self, ip_addr, debug=False, **kwargs): if 'port' in kwargs: port = kwargs['port'] else: port = 23 try: ...
240
27.63
111
20
1,608
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f3f13776364d7a11_ad2904be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
9
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 23, 29, 47, 52, 61, 80, 86, 146, 152 ]
[ 26, 32, 50, 55, 64, 83, 89, 149, 155 ]
[ 30, 30, 30, 30, 30, 34, 34, 26, 22 ]
[ 14, 14, 14, 14, 14, 18, 18, 14, 6 ]
2024-11-18T22:35:56.275574+00:00
1,565,090,854,000
4b2e5263bbfe14f8ad202e2a829c71299559dc4c
2
{ "blob_id": "4b2e5263bbfe14f8ad202e2a829c71299559dc4c", "branch_name": "refs/heads/master", "committer_date": 1565090854000, "content_id": "9e25c8aa556e824e35ab9eab5410fbcc8093c9ba", "detected_licenses": [ "MIT" ], "directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c", "extension": "py", "fi...
2.375
stackv2
#coding:utf-8 import socket,sys import cx_Oracle def oracleburp(ip,port): addr = (ip,int(port)) with open('oracle\user.txt') as user: users = user.readlines() user.close() with open('oracle\pass.txt') as passs: passwords = passs.readlines() passs.close() sock_1521 = socket....
34
24.26
100
18
221
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_edd0471d9169b515_ae6029ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 38 ]
[ 100 ]
2024-11-18T22:36:03.929705+00:00
1,686,846,777,000
2caf16452d8a3c82922ed9ee1a3aecdc0054cab4
3
{ "blob_id": "2caf16452d8a3c82922ed9ee1a3aecdc0054cab4", "branch_name": "refs/heads/master", "committer_date": 1686846777000, "content_id": "0bdfb84de69234871bd5fcc9921445dd508ff6ab", "detected_licenses": [ "MIT" ], "directory_id": "cccb39f0c9916397dc9ee9a8326cefdb3027df6b", "extension": "py", "fi...
3.28125
stackv2
# 4% rule def calc_lump_sum(core): return 25 * 12 * core core = 1000 # assume core expenses 1000 a month lump = calc_lump_sum(core) rate = 0.07 def compound_year (initial, monthly, rate): annual = 12 * monthly return (annual + initial) * (1 + rate) def compound_years (initial, monthly, rate, years): ...
45
27.67
149
12
479
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f2ed4cbf186db345_070f9f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 45 ]
[ null ]
[ 11 ]
[ 51 ]
2024-11-18T22:36:17.409575+00:00
1,622,930,580,000
371ddaa245ee1b2d2c86bf1ddbc78a9ceca8500b
3
{ "blob_id": "371ddaa245ee1b2d2c86bf1ddbc78a9ceca8500b", "branch_name": "refs/heads/main", "committer_date": 1622930580000, "content_id": "7e27ac358ba2bae4fd00a134ad08ddcf4271601d", "detected_licenses": [ "MIT" ], "directory_id": "8c966aaaaf3f653ba6df1b2f132a38f7cd001453", "extension": "py", "file...
2.5625
stackv2
import jwt from flask import jsonify, request import datetime from functools import wraps from security.admins import db from os import getcwd from models.models import * def get_secret_key(): path = os.path.dirname(os.path.realpath(__file__)) + '/security/secret_key.txt' file = open(path) key = file.read...
91
26.27
133
18
623
python
[{"finding_id": "codeql_py/stack-trace-exposure_19f4d3a8557832e5_a2dfeb65", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 59 ]
[ null ]
[ 28 ]
[ 48 ]
2024-11-18T22:36:23.804924+00:00
1,592,937,781,000
2f283485757b410ffc343c907cd88b078ad653be
2
{ "blob_id": "2f283485757b410ffc343c907cd88b078ad653be", "branch_name": "refs/heads/master", "committer_date": 1592937781000, "content_id": "8bea341797bcf6341af72fb49d042b895d460bbc", "detected_licenses": [ "MIT" ], "directory_id": "2eb027650d1c447ae2778e64b4b3824a8188f882", "extension": "py", "fi...
2.453125
stackv2
import cv2 import base64 import urllib.request import numpy as np import os from darkflow.net.build import TFNet from flask import Flask, request, url_for from werkzeug.utils import secure_filename UPLOAD_FOLDER = "/tmp/photos/" ALLOWED_EXTENSIONS = {"txt", "pdf", "png", "jpg", "jpeg", "gif"} app = Flask(__name__) ...
84
26.88
87
16
594
python
[{"finding_id": "codeql_py/flask-debug_dfa95de63fb136d2_9d0ec67c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 84, 34 ]
[ null, null ]
[ 5, 14 ]
[ 40, 46 ]
2024-11-18T22:36:40.123965+00:00
1,501,533,363,000
9dc02592d4f324049c63b62d5f5d540943581799
2
{ "blob_id": "9dc02592d4f324049c63b62d5f5d540943581799", "branch_name": "refs/heads/master", "committer_date": 1501533363000, "content_id": "3092ba5941eb48ef94b322174da02cab103e9fa5", "detected_licenses": [ "MIT" ], "directory_id": "e46ba5a574bfe5c605734d01f9cb9691a334c3d9", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import socket import sys import time import signal from struct import unpack import argparse this = sys.modules[__name__] VERSION = '0.1a' RELEASE = 'Development' if sys.version_info[0] < 3: # Python 3 required for command line execution raise AssertionError("M...
335
31.64
116
20
2,692
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0f306b12fe25585_915aff14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 136 ]
[ 139 ]
[ 15 ]
[ 58 ]
2024-11-18T20:23:16.875015+00:00
1,497,028,131,000
4b0c41119e5f435cd86d2179a3d1d11149ce7487
3
{ "blob_id": "4b0c41119e5f435cd86d2179a3d1d11149ce7487", "branch_name": "refs/heads/master", "committer_date": 1497028131000, "content_id": "415dd98625362a20c740942ec271e028a4994f56", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a433c2fdb12b40117eae55ba0f932b298efb1b24", "extension": "p...
3.265625
stackv2
## # import random erros=0 acertos=[] digitadas=[] def main(): print("="*39) print("="*12, "Jogo da Forca", "="*12) print("="*39) embaralha() opcao() print("="*39) def imprimir(): print("Palavra Chave -> %s"%senha) print("Você errou %d vezes"%erros) print("Letras digitadas") ...
125
23.99
117
16
829
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86c9707ccfcf387a_c2ae1fcb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 36, 102 ]
[ null, null ]
[ 15, 23 ]
[ 16, 24 ]
2024-11-18T20:23:35.452885+00:00
1,420,834,490,000
f812f1efbdd45835c8bb2b9ec9534fef96ae2633
2
{ "blob_id": "f812f1efbdd45835c8bb2b9ec9534fef96ae2633", "branch_name": "refs/heads/master", "committer_date": 1420834490000, "content_id": "5bdce1d599c60282f9156982162c761c4bd3b8e2", "detected_licenses": [ "MIT" ], "directory_id": "4c22364e9b43ae5b8ccf250430be3b437ff00f3d", "extension": "py", "fi...
2.34375
stackv2
from flask import render_template, flash, redirect, url_for, request, g, jsonify from flask.ext.login import login_user, logout_user, current_user, login_required from infrastructure import app, lm, db from forms import LoginForm, RegistrationForm from models import User, Token, Match import models @app.route('/', me...
85
30.64
120
17
570
python
[{"finding_id": "codeql_py/url-redirection_ea64741fa4aa5f76_e8d2f146", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 50 ]
[ null ]
[ 29 ]
[ 73 ]
2024-11-18T21:22:14.204214+00:00
1,493,219,475,000
c6bcada86afd36385e8cbe0dc19bfc3591cb69c5
3
{ "blob_id": "c6bcada86afd36385e8cbe0dc19bfc3591cb69c5", "branch_name": "refs/heads/master", "committer_date": 1493219475000, "content_id": "cf9f0f845183cd8bf08a0a7c34874bb2abd0ea9d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61c1dd56b86e3fd29b7d9c78e0c2757b2da1e890", "extension": "py"...
2.609375
stackv2
#Copyright [yyyy] [name of copyright owner] #Licensed under the Apache License, Version 2.0 (the "License"); #you may not use this file except in compliance with the License. #You may obtain a copy of the License at #http://www.apache.org/licenses/LICENSE-2.0 #Unless required by applicable law or agreed to in wr...
439
23.36
151
17
3,116
python
[{"finding_id": "codeql_py/partial-ssrf_dfab67cc6a3b1483_11418977", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of ...
[ 93, 120, 131 ]
[ null, null, null ]
[ 4, 4, 4 ]
[ 72, 58, 61 ]
2024-11-18T21:23:17.285946+00:00
1,691,903,891,000
47b3a3c35249cbeffd5225a0a4f7aa8f203e5d98
2
{ "blob_id": "47b3a3c35249cbeffd5225a0a4f7aa8f203e5d98", "branch_name": "refs/heads/master", "committer_date": 1691903891000, "content_id": "6d30026f02811321d0a8d88511e4b56c789be0ea", "detected_licenses": [ "MIT" ], "directory_id": "3b357a468e608958745ff7c72be35a5f9d83de72", "extension": "py", "fi...
2.40625
stackv2
import click import requests import yaml from dtoolcore import iter_datasets_in_base_uri from dtool_lookup_server.utils import generate_dataset_info def get_projects(fpath): """Return projects dictionary.""" with open(fpath) as fh: projects = yaml.load(fh, Loader=yaml.FullLoader) return projects...
162
30.15
78
15
1,031
python
[{"finding_id": "codeql_py/request-without-cert-validation_15f5a2db416b652f_71049e05", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 30, 52, 78, 99 ]
[ 35, 57, 83, 104 ]
[ 20, 16, 20, 24 ]
[ 10, 6, 10, 14 ]
2024-11-18T21:23:18.255786+00:00
1,571,769,507,000
389da327377a3b22213ae9c9ae3c2cb43b36f32f
3
{ "blob_id": "389da327377a3b22213ae9c9ae3c2cb43b36f32f", "branch_name": "refs/heads/master", "committer_date": 1571769507000, "content_id": "6670326189fc7e5810ba4c8bfdb2b0438f969d1b", "detected_licenses": [ "MIT" ], "directory_id": "5c223be5b0bde3f474ecadcaf806d2c17acd9c6a", "extension": "py", "fi...
2.859375
stackv2
# HackRU Fall 2019 # SMS Recommendation # Uses Google Places API to get nearby locations through sms instead of data # Authors: # Sohan Ganguli (@engineeringmamba) # Krzysztof Grochal (@KrzysGro) # ZiJun Weng (@AtelierSilver) # import googlemaps import requests import json import pycodestyle import ssl from uszipcode i...
88
25.68
166
16
626
python
[{"finding_id": "codeql_py/partial-ssrf_6bb4b84dd0b46233_33d34fca", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 58 ]
[ 59 ]
[ 16 ]
[ 110 ]
2024-11-18T21:23:18.810694+00:00
1,603,179,913,000
4b8589a8ea72f9dd13d2ec875182fc127990d430
3
{ "blob_id": "4b8589a8ea72f9dd13d2ec875182fc127990d430", "branch_name": "refs/heads/master", "committer_date": 1603179913000, "content_id": "78a0ff7483419f282d439c29b9990d9c72253ee8", "detected_licenses": [ "MIT" ], "directory_id": "e3354e6fb168b5d96ac20a47c6df48aa3466215c", "extension": "py", "fi...
3.171875
stackv2
# -*- coding: utf-8 -*- import sys import re import posixpath from typing import List # Default accepted languages - these are the ones recognized by langdetect KNOWN_LANG_TAGS = ['af', 'ar', 'bg', 'bn', 'ca', 'cs', 'cy', 'da', 'de', 'el', 'en', 'es', 'et', 'fa', 'fi', 'fr', 'gu', 'he', 'hi', 'hr',...
157
28.5
79
13
1,150
python
[{"finding_id": "codeql_py/overly-large-range_44d0652c11d8082c_3c7629e8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 42 ]
[ null ]
[ 31 ]
[ 34 ]
2024-11-18T21:51:27.597697+00:00
1,580,982,782,000
fb5822d6e47bb08376fd1336d38a300207cd24d0
3
{ "blob_id": "fb5822d6e47bb08376fd1336d38a300207cd24d0", "branch_name": "refs/heads/master", "committer_date": 1580982782000, "content_id": "65a442e556220e850075468ec46231585cb90de4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "adf30eaa4fd6fd640860bdaa661e2b3cc028f8b6", "extension": "py"...
2.515625
stackv2
def No_date_special_characters(fle, fleName, target): import re import os import sys import json import openpyxl import pandas as pd from pandas import ExcelWriter from pandas import ExcelFile from dateutil.parser import parse import validators configFile = 'https://s3.us-east.cloud-object-storage.appdomain...
71
33.24
114
25
652
python
[{"finding_id": "codeql_py/overly-large-range_51cee27b3ce400bd_a41f5b26", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 29 ]
[ null ]
[ 52 ]
[ 55 ]
2024-11-18T21:51:31.047583+00:00
1,626,167,191,000
4cb3224dbfd10873af0cdf4e323f82e826c8d7d2
2
{ "blob_id": "4cb3224dbfd10873af0cdf4e323f82e826c8d7d2", "branch_name": "refs/heads/main", "committer_date": 1626167191000, "content_id": "0ca740ba4ceca02ba5b88789c903da2ded15a107", "detected_licenses": [ "MIT" ], "directory_id": "7306350e914ba6c8e5563250b1565f0d3466608d", "extension": "py", "file...
2.421875
stackv2
import sys from PyQt5.QtCore import * from PyQt5.QtGui import * from PyQt5.QtWidgets import * import paramiko class Window(QWidget): def __init__(self, parent = None): QWidget.__init__(self, parent) self.setGeometry(100,100,256,128) self.loginFrame = QFrame() self.usernameBox = QLi...
89
33.65
102
12
652
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_288a0b585fbd3f21_148ce3b7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 65, 76 ]
[ null, null ]
[ 9, 9 ]
[ 73, 73 ]
2024-11-18T21:52:00.764778+00:00
1,635,184,707,000
8316d9de702578ba7adae575abb562a1e2b48441
3
{ "blob_id": "8316d9de702578ba7adae575abb562a1e2b48441", "branch_name": "refs/heads/main", "committer_date": 1635184707000, "content_id": "7be6c65253fd1c815b77ca95ee4ddc9ada2edb58", "detected_licenses": [ "MIT" ], "directory_id": "343bfcfd80fe1dc0aa8c691370b02c0ec4e99b60", "extension": "py", "file...
2.515625
stackv2
from flask import Blueprint, render_template, request contact = Blueprint('contact', __name__) # connect to your Mongo DB database # client = pymongo.MongoClient(f"mongodb+srv://{user}:{password}@clusterforproject.ddxhn.mongodb.net/{database}?" # + "retryWrites=true&w=majority") # # get th...
55
38.09
113
18
443
python
[{"finding_id": "codeql_py/reflective-xss_4168870bc8db55cb_7bbc628e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 20 ]
[ 27 ]
2024-11-18T21:52:10.878618+00:00
1,631,168,797,000
734c553f1f1b6e66681629ca3bc4a981a15683dd
3
{ "blob_id": "734c553f1f1b6e66681629ca3bc4a981a15683dd", "branch_name": "refs/heads/main", "committer_date": 1631168797000, "content_id": "1744da7568d4c859ea52fb5b9680853970bffd4c", "detected_licenses": [ "MIT" ], "directory_id": "6738b1a0eda1113c0d97e7918f745edda7e60dd8", "extension": "py", "file...
2.671875
stackv2
import datetime as dt import random import pandas import smtplib # Change the information below SENDER_NAME = 'John Doe' MY_EMAIL = 'example@gmail.com' TO_EMAIL = 'example@gmail.com' PASSWORD = 'example' now = dt.datetime.now() current_month = now.month current_day = now.day data = pandas.read_csv('birthdays.csv') b...
40
30.73
81
16
284
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab4e46504fed4130_217fbe57", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 18 ]
[ null ]
[ 7 ]
[ 20 ]
2024-11-18T22:02:46.452373+00:00
1,632,943,660,000
e7311cbc9ab5ac655885a5548d59fe245c20919c
3
{ "blob_id": "e7311cbc9ab5ac655885a5548d59fe245c20919c", "branch_name": "refs/heads/master", "committer_date": 1632943660000, "content_id": "85bff49dc46cf515e4c83dd87707cad088f43ab8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39cfe0bd795b0c32976c1114c245844342b3115f", "extension": "py"...
2.71875
stackv2
import os from jinja2 import Environment, FileSystemLoader import tensorflow as tf from tensorflow import keras from utils import load_data_set, load_image_test, map_prediction_to_mask, compare_accuracy, labeled_prediction_to_image, \ count_files_in_folder, files_in_folder from metrics import iou_coef, dice_coef, ...
95
39.56
122
12
820
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7d526f9fed88a2cf_1cceb31e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T22:02:48.622794+00:00
1,556,607,827,000
d183d2bf36efeb1332bd247c92b8e3c13132f8b6
3
{ "blob_id": "d183d2bf36efeb1332bd247c92b8e3c13132f8b6", "branch_name": "refs/heads/master", "committer_date": 1556607827000, "content_id": "0c67dd9aaec3e64ef6ba793931dd94b32bde0407", "detected_licenses": [ "MIT" ], "directory_id": "f616fad46a6dd0acfb058a5e189ac7e487d524a0", "extension": "py", "fi...
2.75
stackv2
#coding=utf-8 import http.client import hashlib from urllib import parse import random def translate(txt_input): appid = '20190416000288427' #你的appid secretKey = 'OjhiDsnJagVUOxAoqxSz' #你的密钥 httpClient = None myurl = '/api/trans/vip/translate' q = txt_input #'我他妈要红色高跟鞋\n' fromLang = 'zh' ...
84
27.1
119
19
750
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4ed1b2f8b8747b79_19792977", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 19 ]
[ null ]
[ 15 ]
[ 44 ]
2024-11-18T22:16:43.096233+00:00
1,551,318,940,000
195fec4dfeeef75f82e789159bf4c488f2ece126
4
{ "blob_id": "195fec4dfeeef75f82e789159bf4c488f2ece126", "branch_name": "refs/heads/master", "committer_date": 1551318940000, "content_id": "a116b497b295125d2070b7dfc2b141bf93d260fc", "detected_licenses": [ "MIT" ], "directory_id": "e4b019d2fd32e8e317dbbf4e440de1ff1686939c", "extension": "py", "fi...
3.515625
stackv2
import glob import os from jinja2 import Template def discover_pages(): print('compiling pages list...') pages = [] all_content_docs = glob.glob("content/*.html") # returns list of filepaths for doc in all_content_docs: # create dictionary with input filepath, output filepath, and title ...
86
27.92
98
17
563
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_052898f0b02f6670_4e4194f2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 16 ]
[ 39 ]
2024-11-18T22:27:40.398158+00:00
1,532,204,334,000
3278845cdfee5aecc481f23ccb31671344d9dcd9
3
{ "blob_id": "3278845cdfee5aecc481f23ccb31671344d9dcd9", "branch_name": "refs/heads/master", "committer_date": 1532204334000, "content_id": "9cd67825b95f2c2e17ea9a13aeefbede105b5a37", "detected_licenses": [ "MIT" ], "directory_id": "3626796ac3f5b5b21695fdd5abb1423574d9ae35", "extension": "py", "fi...
3.265625
stackv2
import getpass import hashlib import pyperclip constant = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789' * 1000 print('Please input the name of the place where the password is used (should be unique).') name = input() while True: password = getpass.getpass('Please input your master password.') ...
27
28.78
90
10
192
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a9eecfc04deceee1_dd1211d9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 20 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-18T22:27:53.659810+00:00
1,665,246,170,000
701aea92751416bbebcf5021131a7d2401c109ff
3
{ "blob_id": "701aea92751416bbebcf5021131a7d2401c109ff", "branch_name": "refs/heads/master", "committer_date": 1665246170000, "content_id": "e018670f6db56d25ca87919888e129c2ae63bb47", "detected_licenses": [ "MIT" ], "directory_id": "a7cf147e30637744342e3c88f87c4491a67e16d8", "extension": "py", "fi...
3.1875
stackv2
# -*- coding: utf-8 -*- import os import time import tarfile from fman import ( DirectoryPaneCommand, show_status_message, show_prompt, ) __author__ = "Usman Mahmood" __license__ = "MIT" __version__ = "1.0.1" __maintainer__ = "Usman Mahmood" class Tarball(DirectoryPaneCommand): def __call_...
138
33.15
87
18
1,040
python
[{"finding_id": "codeql_py/tarslip_f2425f43198e580c_958e4c34", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 71 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T22:28:14.645830+00:00
1,652,934,180,000
8d1fd3d5b18e3223a60547b77a2860e3ec441f37
3
{ "blob_id": "8d1fd3d5b18e3223a60547b77a2860e3ec441f37", "branch_name": "refs/heads/master", "committer_date": 1652934180000, "content_id": "4ed540da687d6c51f6a7e8c7c4847262ddf57175", "detected_licenses": [ "MIT" ], "directory_id": "adb112e307f153abaa94dda7effdc423fc0ee307", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python telescope = "ASKAP" latitude_deg = -26.697000722 diameter_m = 12.0 import os import sys from util_misc import ascii_dat_read #-----------------------------------------------------------------------------# def main(): # Read the pad lookup table col, dummy = ascii_dat_read("ASKAP_pads....
58
31.22
79
15
505
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1ad3b914d0241442_2966abe5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 45 ]
[ null ]
[ 18 ]
[ 54 ]
2024-11-18T22:44:03.376901+00:00
1,588,115,718,000
15eabca3745ba5f9feac5081234c38e07d30cbc6
3
{ "blob_id": "15eabca3745ba5f9feac5081234c38e07d30cbc6", "branch_name": "refs/heads/master", "committer_date": 1588115718000, "content_id": "7e7806eb4c1688c95e9a7f3b2f7c7f5c48925da1", "detected_licenses": [ "MIT" ], "directory_id": "5f31dcada0073ad855dcbdcd88e6fd95d43611d8", "extension": "py", "fi...
2.90625
stackv2
import base64 from Cryptodome.Cipher import AES from datetime import date #Key 16 digit olmalıdır. def getKeyGenerator(): key = str(date.today())+"12345" while len(key) < 16: key = key +"0" return key def getDecode(encode): secret_key = getKeyGenerator().encode("utf-8") cipher = AES.new(s...
28
24
72
13
198
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_cb412d3b6720b5a3_0ce3781d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 16, 25 ]
[ null, null ]
[ 15, 32 ]
[ 55, 72 ]
2024-11-18T22:44:05.313683+00:00
1,621,860,898,000
df30c693a3857ec51757d42656764ea0834a4e85
2
{ "blob_id": "df30c693a3857ec51757d42656764ea0834a4e85", "branch_name": "refs/heads/master", "committer_date": 1621860898000, "content_id": "0585e30d2b513320f948c7d58e4f8090c0ec0132", "detected_licenses": [ "MIT" ], "directory_id": "451549ec3f5ea043b964541d72dd2609ea0a6278", "extension": "py", "fi...
2.390625
stackv2
import argparse import json import subprocess from jinja2 import Template import toml import black # Template and target file locations of files that need to be generated CODEGEN_FILES = [ ("codegen/kanji_lists.jinja2", "kanji_lists/kanji_lists.py"), ("codegen/__init__.jinja2", "kanji_lists/__init__.py"), ...
79
26.63
73
16
495
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9b386c93dbdadde9_11a43471", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 24 ]
[ 44 ]
2024-11-18T21:00:31.190074+00:00
1,692,339,049,000
6d462595aacb82dda7dcb1f8beea268e9c385e4d
3
{ "blob_id": "6d462595aacb82dda7dcb1f8beea268e9c385e4d", "branch_name": "refs/heads/master", "committer_date": 1692339049000, "content_id": "ecd8d0fa9f66de980d877ac13818311333768b37", "detected_licenses": [ "MIT" ], "directory_id": "0b60bd51d0dab21faed0b09ac4470fdcaa5400a3", "extension": "py", "fi...
2.625
stackv2
from resources import utils, config as cfg import itertools from os.path import join, basename from glob import glob import argparse from jinja2 import Environment, FileSystemLoader import json import numpy as np from prettytable import PrettyTable class Comparison(object): """ Contains all the data required...
186
34.28
121
17
1,352
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fa111fe36051863c_40a81144", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 137 ]
[ 138 ]
[ 11 ]
[ 117 ]
2024-11-18T21:00:36.576389+00:00
1,563,517,080,000
d6ae93ec60ab9c07691bc57fb963a59c84540e6a
2
{ "blob_id": "d6ae93ec60ab9c07691bc57fb963a59c84540e6a", "branch_name": "refs/heads/master", "committer_date": 1563517080000, "content_id": "3efa4fa9e3004a045d5107f0bcc7892a80587d65", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e014e5324ac8c05f14fc96227295dbf2007054e5", "extension": "py"...
2.4375
stackv2
import paramiko,time def get_remote0(Host,Port=22,User='admin',Password='admin1'): ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect(Host, Port, User, Password) chan = ssh.invoke_shell() chan.send('config\n') file_tosave = str(time.strftime('%Y-%m-%d_%H_%M_%S',time...
27
30.52
87
14
267
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1e01aef006682778_6b0ed577", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 5 ]
[ null ]
[ 2 ]
[ 59 ]
2024-11-18T21:00:57.956597+00:00
1,594,825,602,000
bc2997c27ed55ab9ba8fa9f2c4a40893a71dce6b
3
{ "blob_id": "bc2997c27ed55ab9ba8fa9f2c4a40893a71dce6b", "branch_name": "refs/heads/master", "committer_date": 1594825602000, "content_id": "21a7d4e6021a97c9bc1daefa90f9f33f6ae0f3d8", "detected_licenses": [ "MIT" ], "directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2", "extension": "py", "fi...
2.546875
stackv2
import requests import json from Get_Room import get_room from tools.api_key_webex import key room_id = get_room('WebEx Automation') print(room_id) url = "https://webexapis.com/v1/messages?roomId="+room_id request = requests.session() request.headers = { 'Authorization': f'Bearer {key}', 'Content-Type': 'a...
31
18.71
71
11
151
python
[{"finding_id": "codeql_py/request-without-cert-validation_f8c6e0dee7b04aa7_f12a9a8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 12 ]
[ 65 ]
2024-11-18T21:01:01.400400+00:00
1,466,061,763,000
1530e344906291eb4fc7fde8eeacbf2e0e25a015
2
{ "blob_id": "1530e344906291eb4fc7fde8eeacbf2e0e25a015", "branch_name": "refs/heads/master", "committer_date": 1466061763000, "content_id": "67f1910347853d7b3dc0e2bf6a968b1f1daecd31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c00539ed72a86a8b9af8e9be3247ae1b1a85c997", "extension": "py"...
2.4375
stackv2
import json import logging import urllib import urllib2 from flask import Flask, Response, request from google.appengine.api import urlfetch, memcache from google.appengine.ext import ndb from dateutil import parser import time app = Flask(__name__) #constant for connecting to telegram TOKEN = "230588661:AAHxRwP4fH473...
127
31.5
150
18
1,023
python
[{"finding_id": "codeql_py/reflective-xss_a8cb0ac1d8653a12_a13e3c73", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scri...
[ 84, 90, 94, 101, 104, 69 ]
[ null, null, null, null, null, null ]
[ 33, 33, 33, 29, 29, 18 ]
[ 44, 44, 44, 40, 40, 29 ]
2024-11-18T21:01:01.756970+00:00
1,665,673,250,000
de62c51dc7027b8cb084b27e7fd240cdfa580402
2
{ "blob_id": "de62c51dc7027b8cb084b27e7fd240cdfa580402", "branch_name": "refs/heads/master", "committer_date": 1665673250000, "content_id": "8208e683f15cb763381f81cbab2bd3fb45fcbbf6", "detected_licenses": [ "MIT" ], "directory_id": "96bf72e5c296970ba9ec603d7413d26d1ea41789", "extension": "py", "fi...
2.484375
stackv2
import glob import json config_field = None def config(): global config_field if(config_field is None): config_field = json.load(open('config.json')) return config_field def splitPerClass(data): neutral = [line for line in data if line[0] == 'neutral'] negativ = [line for line in data if l...
135
28.16
109
14
1,116
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_21ccd6563b8548d6_5a1eff48", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.filmstarts.de](1) may be at an arbitrary po...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://www.filmstarts.de](1) may be at an arbitrary position in the sanitized URL." ]
[ 89 ]
[ null ]
[ 36 ]
[ 82 ]
2024-11-18T21:25:27.160479+00:00
1,637,578,739,000
3bf24a8a15989c79a99cbb942d9316979c1813d0
3
{ "blob_id": "3bf24a8a15989c79a99cbb942d9316979c1813d0", "branch_name": "refs/heads/master", "committer_date": 1637578739000, "content_id": "362ebea78486192d8f4a68190eb0d975385e61c6", "detected_licenses": [ "MIT" ], "directory_id": "3a6fac45e202f88e664cb58a55c245b12b3aaaf9", "extension": "py", "fi...
2.578125
stackv2
#!/usr/local/bin/python3 from http.server import SimpleHTTPRequestHandler from socketserver import ForkingTCPServer from urllib.request import urlopen from argparse import ArgumentParser argParser = ArgumentParser() argParser.add_argument( "--proxy-host", type = str, default = "127.0.0.1", help ...
63
33.25
113
18
549
python
[{"finding_id": "codeql_py/partial-ssrf_da53a75a0dc7bf41_6c126cb3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 27 ]
[ 44 ]
2024-11-18T22:01:02.601281+00:00
1,560,040,131,000
9645055cb8dbc80759f78e5b2514cf3d77789021
3
{ "blob_id": "9645055cb8dbc80759f78e5b2514cf3d77789021", "branch_name": "refs/heads/master", "committer_date": 1560040131000, "content_id": "0f11869af20ec240747e0595e2b3f3dc822b811d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "694a6ecdb2581dbf7b180a6d91b858c53d94f234", "extension": "py"...
3.140625
stackv2
import itertools as it import string from utils import timefunc import paramiko def create_client(): client_policy = paramiko.AutoAddPolicy() client = paramiko.SSHClient() client.set_missing_host_key_policy(client_policy) return client class Brutus: def __init__(self, charset, length, ip): ...
49
24.49
91
15
287
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cb517fbdcc04bfe5_53851a9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-312" ]
[ "py/paramiko-missing-host-key-validation", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 10, 45 ]
[ null, null ]
[ 5, 15 ]
[ 54, 43 ]
2024-11-18T22:01:14.090477+00:00
1,511,016,732,000
e4102d2b46694532614f743ac8b3c1f9a8e16bfe
2
{ "blob_id": "e4102d2b46694532614f743ac8b3c1f9a8e16bfe", "branch_name": "refs/heads/master", "committer_date": 1511016732000, "content_id": "769257641e35ee9e39851c3a9648c7a9efd74e8f", "detected_licenses": [ "MIT" ], "directory_id": "edb7527976e2fdc8e38843a19096f707055e0e05", "extension": "py", "fi...
2.328125
stackv2
import requests import os import platform import yaml import urllib3 import tqdm import hashlib import xml.etree.ElementTree as ET from .sfo import SfoFile BUFFER_SIZE = 1024 * 1024 * 3 DEFAULT_RPCS3_SUBDIRS = ["shaderlog", "GuiConfigs", "dev_usb000", ...
201
31.21
118
22
1,432
python
[{"finding_id": "codeql_py/request-without-cert-validation_cc2052c7b7dab2d5_683d3223", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 106, 124 ]
[ 107, 126 ]
[ 9, 17 ]
[ 39, 42 ]
2024-11-18T22:15:03.576875+00:00
1,388,926,163,000
e82d2f8ef7c9a84193ba9e9f73ca6de736decf21
3
{ "blob_id": "e82d2f8ef7c9a84193ba9e9f73ca6de736decf21", "branch_name": "refs/heads/master", "committer_date": 1388926163000, "content_id": "f41ec534dd030f5f3ddf0e6617a4a0dbe915db1a", "detected_licenses": [ "MIT" ], "directory_id": "4e0f36ca8a7c7dcceca10f0a3fec01703b22481a", "extension": "py", "fi...
2.5625
stackv2
# Copyright (c) 2010 Hans Christian v. Stockhausen # This file is part of mailreactor. # See LICENSE for details. import time import hashlib import base64 SECRET = '97303e71573c34af06eb0b7dbffc42e2' class SRSError(Exception): pass class SRS(object): def __init__(self, address, hostname): if add...
130
34.89
83
18
1,318
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f2e7abb286245031_7e8a93d8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 100 ]
[ null ]
[ 28 ]
[ 46 ]
2024-11-18T20:39:52.852323+00:00
1,598,969,508,000
8323e29e6e9759e422f94c2e69d7e570aff9397d
2
{ "blob_id": "8323e29e6e9759e422f94c2e69d7e570aff9397d", "branch_name": "refs/heads/master", "committer_date": 1598969508000, "content_id": "da00d9782d4415ad157a8929affb480d7c962d80", "detected_licenses": [ "MIT" ], "directory_id": "00f764663f3f195e1c6e2ecf306add77e0b014c9", "extension": "py", "fi...
2.328125
stackv2
import re import json import socket import paramiko import basesocket class Ssh(basesocket.BaseSocket): TYPE_PASSWORD = 1 TYPE_PUBLIC_KEY = 2 def __init__(self, sock, proxy, config): super(Ssh, self).__init__(sock) self.termId = config['termId'] self.host = config['host'] ...
96
26.79
84
14
602
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c02fb5cdfd26c667_8c0d0da3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 13 ]
[ 75 ]
2024-11-18T21:08:06.517036+00:00
1,631,969,409,000
f1e0b7caafb0e93735eeb2b8fda8ba152076607d
4
{ "blob_id": "f1e0b7caafb0e93735eeb2b8fda8ba152076607d", "branch_name": "refs/heads/master", "committer_date": 1631969409000, "content_id": "235edf0a631f5e0227a12715f2eccb74d6f52dc2", "detected_licenses": [ "MIT" ], "directory_id": "8731717a5966e1589832d4079f1a892f56ffdc38", "extension": "py", "fi...
4.15625
stackv2
import secrets, string def password_generator(): """ A program that generates a secure random password : return: None """ try: # get the length of alphabets to be present in password length_of_alphabets = int(input('\nEnter the length of alphabets (upper and lower case inclusive): '...
30
49.8
114
15
311
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d81d2a925e16081f_6a2b42d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 28 ]
[ null ]
[ 15 ]
[ 100 ]
2024-11-18T21:33:10.726196+00:00
1,598,908,563,000
0e7e72e2edb9b6e2137b88ab6bc7e860a23ee1cb
3
{ "blob_id": "0e7e72e2edb9b6e2137b88ab6bc7e860a23ee1cb", "branch_name": "refs/heads/master", "committer_date": 1598908563000, "content_id": "e62074d9cc64c31e77c1ccb1e450b38f72a63a2b", "detected_licenses": [ "MIT" ], "directory_id": "01b1842a7b0f57a66184a388c629c9409b400dad", "extension": "py", "fi...
2.515625
stackv2
import ast from collections import defaultdict import os import traceback import sys import time import jinja2 import yaml class Definitions: """ Holds the definitions for the attacker actions on which the generator executes """ def __init__(self, config, env): self.definitions_path = config...
181
42.03
130
24
1,537
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f6cc89be6939225c_85af4ac6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 176 ]
[ null ]
[ 25 ]
[ 83 ]
2024-11-18T21:49:03.224953+00:00
1,551,852,043,000
3da8d29afd9a0e4cbac763fa05a08c501ab2b407
3
{ "blob_id": "3da8d29afd9a0e4cbac763fa05a08c501ab2b407", "branch_name": "refs/heads/master", "committer_date": 1551852043000, "content_id": "92ea7655529b88eb5f67b98748be960ec9dfaa6a", "detected_licenses": [ "MIT" ], "directory_id": "dfecb18988858b6bc54131c3fa087dbb641b333b", "extension": "py", "fi...
2.546875
stackv2
import logging import os import csv from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import status import numpy as np import sys,os import json import csv import hashlib import datetime from random import * from iFEED_API.venn_diagram.intersection import opti...
211
32.82
115
24
1,295
python
[{"finding_id": "codeql_py/path-injection_fc5004761a636f9c_63eebafb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 23 ]
[ 32 ]
2024-11-18T22:26:08.282503+00:00
1,631,126,026,000
b70cd07f4a8189a522db31f2eee2d50cf5529bd9
2
{ "blob_id": "b70cd07f4a8189a522db31f2eee2d50cf5529bd9", "branch_name": "refs/heads/master", "committer_date": 1631126026000, "content_id": "c5cd56118d9d3059fe6616e2418fd8c79e43cc76", "detected_licenses": [ "MIT", "CC0-1.0" ], "directory_id": "251f5c092d4b7760cec8c2b6324e5290b917721f", "extensio...
2.375
stackv2
import json import re import scrapy from locations.hours import OpeningHours from locations.items import GeojsonPointItem class AdvanceautopartsSpider(scrapy.Spider): name = "advanceautoparts" item_attributes = {"brand": "Advance Auto Parts", "brand_wikidata": "Q4686051"} allowed_domains = ["stores.adv...
68
42.01
119
17
628
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_9f2a4efa8c7bc38c_c972d1bd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'advanceautoparts.com/', so it might...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'advanceautoparts.com/', so it might match more hosts than expected." ]
[ 20 ]
[ null ]
[ 32 ]
[ 87 ]
2024-11-18T22:42:13.172776+00:00
1,653,444,826,000
903440b99fc9e9cddc325fcae934a31624b45ec2
2
{ "blob_id": "903440b99fc9e9cddc325fcae934a31624b45ec2", "branch_name": "refs/heads/master", "committer_date": 1655689101000, "content_id": "4a81351e9e92fdceaaea7fc1eaea1f37f9ed38f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5860c281b7d0b79e4af58edd589971f5317ea68f", "extension": "py"...
2.421875
stackv2
# Foremast - Pipeline Tooling # # Copyright 2018 Gogo, LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required...
99
30.01
117
14
674
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_465df91d210e3b32_ee94621c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 16 ]
[ 88 ]
2024-11-18T20:31:40.017736+00:00
1,503,565,595,000
ac8bfcb56685cb9f27395f657f224d39c74dc8da
3
{ "blob_id": "ac8bfcb56685cb9f27395f657f224d39c74dc8da", "branch_name": "refs/heads/master", "committer_date": 1503565595000, "content_id": "41a264a0295ae272755b22458d3fb5776e8efb82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "992018911e21a812dc6f09d94f38d2d46c390126", "extension": "py"...
2.96875
stackv2
#!flask/bin/python #-*- coding: utf-8 -*- from app import app from flask import render_template, request import json from hashlib import md5 import re from datetime import datetime # TODO El 'Añ' no funciona, creo que por la Ñ date_regex = ur'Añadid[oa] el ([^\s,]+),? ([1-9]|[1-3][0-9]?) de ([^\s]+) de ([0-9]+) (?:([0...
113
33.36
173
18
1,022
python
[{"finding_id": "codeql_py/polynomial-redos_7a57dff72b3e4c04_f3f54322", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/polynomial-redos", "py/polynomial-redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '0'.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '0'." ]
[ 34, 39 ]
[ null, null ]
[ 47, 59 ]
[ 55, 71 ]
2024-11-18T20:31:40.926264+00:00
1,549,981,340,000
b0d171522db0194606999e04b22fd9158bce2c96
4
{ "blob_id": "b0d171522db0194606999e04b22fd9158bce2c96", "branch_name": "refs/heads/master", "committer_date": 1549981340000, "content_id": "5bc7d894a6d0da0be7f5620752e11d95a2b86020", "detected_licenses": [ "MIT" ], "directory_id": "924adc5bdf066b8feefda46877d24eeefb7849a4", "extension": "py", "fi...
3.5625
stackv2
#!/usr/bin/env python3.6 def create_user(first_name,last_name,contact,user_name,email,password): ''' Function to create a new user ''' new_user = User(first_name,last_name,contact,user_name,email,password) return new_user def save_users(user): ''' Function to save user ''' user.sav...
140
32.46
155
19
753
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af3c70ec89cd4334_6283b3b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 96 ]
[ null ]
[ 51 ]
[ 109 ]
2024-11-18T20:31:53.050413+00:00
1,396,114,808,000
61418a8155d5d017e254bd736958bd2513c82c19
3
{ "blob_id": "61418a8155d5d017e254bd736958bd2513c82c19", "branch_name": "refs/heads/master", "committer_date": 1396114808000, "content_id": "af1a9d2fae3c0e6b8e37c2cd8595299cd2f8aa18", "detected_licenses": [ "MIT" ], "directory_id": "436c36600e4199db441ded4532bc0c08cf043710", "extension": "py", "fi...
2.96875
stackv2
# coding=utf-8 """ A script that is able to parse the ICS Cards ABN Amro site and download statements for a specific month and save them as CSV. It does some simple parsing of the statement entries to make the CSV data more useful for importing into a financial planning application. For options/help::: > python ...
304
30.86
120
17
2,194
python
[{"finding_id": "codeql_py/request-without-cert-validation_eabf95c3580e36b1_c1508b29", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 176 ]
[ null ]
[ 17 ]
[ 76 ]
2024-11-18T20:53:32.481965+00:00
1,616,960,542,000
8f541c53b39934fb36bf6e70284ea0fb613f9d0f
4
{ "blob_id": "8f541c53b39934fb36bf6e70284ea0fb613f9d0f", "branch_name": "refs/heads/master", "committer_date": 1616960542000, "content_id": "cb3d6e4db58133f9a78f2d8575a0e3cd280dbefc", "detected_licenses": [ "MIT" ], "directory_id": "e16a407418b882443d4c0dc77f213c6ac191d995", "extension": "py", "fi...
3.71875
stackv2
""" pirple/python/project2/main.py Project #2 Create a hangman game """ from os import system, name from time import sleep from random import randint import string def clear_screen(): # for windows if name == 'nt': _ = system('cls') # for mac and linux(here, os.name is 'posix') else: ...
281
28.29
134
21
2,044
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4515a5fa1eff163_9ee02dad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 128, 134, 226 ]
[ null, null, null ]
[ 15, 19, 15 ]
[ 16, 20, 26 ]
2024-11-18T20:53:36.477172+00:00
1,347,003,487,000
21f10caceecd36f693963f3701fcf9620e994954
2
{ "blob_id": "21f10caceecd36f693963f3701fcf9620e994954", "branch_name": "refs/heads/master", "committer_date": 1347003487000, "content_id": "9acaab9547a31fc2a5ac9df37725b6b1f8d23910", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8f2ebfd074f80be51f6bbbc84334c609871f578c", "extension": "p...
2.3125
stackv2
import re import urllib ############### Functions called by stackdoc def get_version(): return 1 def get_ids(title, body, tags): ids = [] if "http://api.jquery.com/" in body: matches = re.findall(r"http://api\.jquery\.com/([.\-a-zA-Z0-9]+)/?", body) for match_id in matches: ...
22
18.59
83
11
110
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4d43b11e75d38e47_afa7dea1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://api.jquery.com/](1) may be at an arbitrary posi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://api.jquery.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 12 ]
[ null ]
[ 8 ]
[ 40 ]
2024-11-18T21:10:49.363592+00:00
1,589,718,217,000
c64190e136015c0f944137ee809f5f18e4f0a60d
3
{ "blob_id": "c64190e136015c0f944137ee809f5f18e4f0a60d", "branch_name": "refs/heads/master", "committer_date": 1589718217000, "content_id": "d643476562c1e0257c19e8abf1b1c5a58c532669", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9af6f5acd478b565f91256f2115ba464ace6005c", "extension": "py"...
2.84375
stackv2
import paramiko import os, time class SSHClient(): sleep_time = 20 def __init__(self, ip_address, private_key, user="ec2-user"): self.ip_address = ip_address self.private_key = private_key self.user = user # Init SSH Client self.RSAkey = paramiko.RSAKey.from_private_...
69
32.28
110
18
501
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2bf34be8d0947ca2_943a8cd3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 17 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-18T21:46:31.587098+00:00
1,491,100,609,000
c8c4a6fa6537e3ffcbddd054b962eb30b058d2da
2
{ "blob_id": "c8c4a6fa6537e3ffcbddd054b962eb30b058d2da", "branch_name": "refs/heads/master", "committer_date": 1491100609000, "content_id": "845339f05dc77e8c827dcfc97e3c73d00e02fd32", "detected_licenses": [ "MIT" ], "directory_id": "945a02e1cd92ede1b0ca60011ab6d84c5a17a1f6", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python import sys import time from struct import unpack from Crypto.Cipher import AES MOD2HEX = dict( (ord(c1),ord(c2)) for (c1,c2) in zip('cbdefghijklnrtuv', '0123456789abcdef') ) def modhex(s): s = s.translate(MOD2HEX) return bytes.fromhex(s) def getcrc(data): v = 0xffff for b...
46
22.37
64
12
417
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8c68a817a17760e9_59395389", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 37 ]
[ null ]
[ 12 ]
[ 27 ]
2024-11-18T21:47:33.276765+00:00
1,548,166,921,000
ff65eeecaa0754e2023f219ff9c64f5ca61a4161
2
{ "blob_id": "ff65eeecaa0754e2023f219ff9c64f5ca61a4161", "branch_name": "refs/heads/master", "committer_date": 1548166921000, "content_id": "c980cc7b5540356f4380ece1056b28ab8b45ef8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b2e8c8a68f69a5ae7a2c2395d28ec9ef91db4e36", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python2 # # config_sensor.py # # Part of the HoneySens SensorOS distribution. # Reconfigures the sensor if given a configuration archive. # # by Pascal Brueckner import sys import os import tempfile import ConfigParser import tarfile import fileinput import shutil if len(sys.argv) != 2 or not os.path....
72
29.06
69
13
559
python
[{"finding_id": "codeql_py/tarslip_90717ba53c23a430_eab512e6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 28 ]
[ null ]
[ null ]
[ 4 ]
2024-11-18T21:47:37.323136+00:00
1,599,147,728,000
96ca50bceeef0ea7fae8d21840af88b731f82b90
3
{ "blob_id": "96ca50bceeef0ea7fae8d21840af88b731f82b90", "branch_name": "refs/heads/master", "committer_date": 1599147728000, "content_id": "d269a5ea77d552a4ed88f08342a2e605b0a50aa8", "detected_licenses": [ "MIT" ], "directory_id": "15c68e1df6f9e91636b867cd7ec6a21191e6bd74", "extension": "py", "fi...
2.8125
stackv2
"""Uses JSON-formated file storage for sessions NOTE: does not time-out the sessions! Based on http://flask.pocoo.org/snippets/132/ """ import os, json from uuid import uuid1 from collections import MutableMapping from flask.sessions import SessionInterface, SessionMixin class JSONSession(MutableMapping, SessionM...
97
28.16
76
15
623
python
[{"finding_id": "codeql_py/path-injection_cbd6ff7497381fa1_ff7f10b7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 23 ]
[ 32 ]
2024-11-18T22:28:50.787599+00:00
1,514,466,786,000
89ef3375ef0f52d9701b02df7163f5386ac20ff7
2
{ "blob_id": "89ef3375ef0f52d9701b02df7163f5386ac20ff7", "branch_name": "refs/heads/master", "committer_date": 1514466786000, "content_id": "0c7cc624ad22e58cbfcb10fcc2f3719a09507ba2", "detected_licenses": [ "MIT" ], "directory_id": "f1d9691476f932bbbbd2102b45ab23d6330bbc17", "extension": "py", "fi...
2.34375
stackv2
import configparser class Config(): def __init__(self): self.api_url = 'http://umorili.herokuapp.com' self.token = '' self.config = None self.cert = None self.port = 8443 self.host = None def load(self): self.config = configparser.ConfigParser() ...
59
25.37
67
11
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_177d6c1b1bb1ab52_1943f864", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 26 ]
[ null ]
[ 29 ]
[ 39 ]
2024-11-18T22:29:02.459662+00:00
1,693,266,904,000
bb5fc1fbfdeeaad519e5d87d3894dcfdaa74f12b
3
{ "blob_id": "bb5fc1fbfdeeaad519e5d87d3894dcfdaa74f12b", "branch_name": "refs/heads/main", "committer_date": 1693266904000, "content_id": "2c297f7cd5409d6d8a47671d934741c638af2398", "detected_licenses": [ "AFL-3.0" ], "directory_id": "ffb0b623455f22af81a03eb52889bd1bfed50566", "extension": "py", "...
2.5625
stackv2
import contextlib import hashlib import logging import os import os.path import platform import re import shutil import sys import tempfile from collections.abc import Generator from datetime import datetime from enum import Enum from pathlib import Path from typing import IO, Any from urllib.parse import urlparse imp...
225
28.65
84
14
1,625
python
[{"finding_id": "codeql_py/overly-permissive-file_84742792dfc11fd6_eda7cfed", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 119 ]
[ null ]
[ 5 ]
[ 37 ]
2024-11-18T22:29:37.306725+00:00
1,424,362,789,000
47bf7bb1de90a4fff15c24c40c3c8d4bf4d50588
2
{ "blob_id": "47bf7bb1de90a4fff15c24c40c3c8d4bf4d50588", "branch_name": "refs/heads/master", "committer_date": 1424362789000, "content_id": "6fc143c8e0ab830faa27eba4d4e11466b8dea15f", "detected_licenses": [ "MIT" ], "directory_id": "e3ba4f661395b1d73b5fc8072f964b32a9242b60", "extension": "py", "fi...
2.375
stackv2
# coding=utf-8 from __future__ import absolute_import, unicode_literals, division from puls.models import memoized from puls import app import mongoengine as mge import datetime import wtforms as wtf import flask_wtf import hashlib class Admin(app.db.Document): # authentication information email = mge.EmailF...
53
35.19
77
15
369
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_98cb279c2ad6297f_9e33d1dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 50 ]
[ null ]
[ 35 ]
[ 43 ]
2024-11-18T22:29:42.629406+00:00
1,691,912,998,000
24df49ed2990436b0e7bb8ed082334f1ca65abd6
2
{ "blob_id": "24df49ed2990436b0e7bb8ed082334f1ca65abd6", "branch_name": "refs/heads/main", "committer_date": 1691912998000, "content_id": "ecb44bbe3abf47663c9634437f5ccca71460df74", "detected_licenses": [ "MIT" ], "directory_id": "c14853662f6d89fc36c1735f0df1989def9d7813", "extension": "py", "file...
2.390625
stackv2
import re from aqt.utils import tooltip, getText, showWarning, askUser, showText from collections import OrderedDict from typing import List, Dict from anki.stats_pb2 import CardStatsResponse from anki.cards import Card from anki.stats import ( REVLOG_LRN, REVLOG_REV, REVLOG_RELRN, REVLOG_CRAM, RE...
310
35.16
138
18
2,850
python
[{"finding_id": "codeql_py/redos_dcee8a1e7c3b3ae5_45db55da", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'deck_name==' and containing many ...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'deck_name==' and containing many repetitions of ' =='." ]
[ 90 ]
[ null ]
[ 39 ]
[ 41 ]
2024-11-18T22:40:26.976426+00:00
1,604,653,091,000
223ab2a9fb973d8c695d953818adf9ed1e0db214
3
{ "blob_id": "223ab2a9fb973d8c695d953818adf9ed1e0db214", "branch_name": "refs/heads/master", "committer_date": 1604653091000, "content_id": "a9e32305cf9398cc840a1fb6543336618ff08083", "detected_licenses": [ "MIT" ], "directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Sample script to get the Time configurations via iRMC Redfish API in Fujitsu PRIMERGY [Usage] $ python ./get_time_configuration -i 192.168.10.10 -u admin -p admin """ import sys import argparse import requests import urllib3 urllib3.disable_warnings(urllib3.ex...
83
29.05
113
16
642
python
[{"finding_id": "codeql_py/request-without-cert-validation_c6458c445f22d69a_c4036503", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 24, 35, 44 ]
[ null, 40, 49 ]
[ 16, 20, 24 ]
[ 70, 10, 14 ]
2024-11-18T22:40:31.627046+00:00
1,566,569,831,000
bab248611973d3b789e39e36168b56386764d5a7
3
{ "blob_id": "bab248611973d3b789e39e36168b56386764d5a7", "branch_name": "refs/heads/master", "committer_date": 1566569831000, "content_id": "8b4e42e5f4cdc4098af094f7c98dd56ec86a02e5", "detected_licenses": [ "MIT" ], "directory_id": "b850fcc016651c93db5951e787d4f5b2f7e077d7", "extension": "py", "fi...
2.546875
stackv2
# coding=utf-8 import os import requests import socket from framework.util.Log import Log TAG = os.path.basename(__file__) class HttpRequest: def __init__(self, host, port=-1, timeout=60, headers={ 'User-Agent':'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 ...
63
34.29
131
16
540
python
[{"finding_id": "codeql_py/request-without-cert-validation_5a745e25b41a644e_5bfc2587", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 27, 45 ]
[ null, 46 ]
[ 24, 24 ]
[ 121, 81 ]
2024-11-18T22:40:34.451068+00:00
1,620,697,532,000
5a18d5c6c61c39d21d3609903aaf793680302ab3
2
{ "blob_id": "5a18d5c6c61c39d21d3609903aaf793680302ab3", "branch_name": "refs/heads/main", "committer_date": 1620697532000, "content_id": "7e76f7bc9ca91a1ae518094836c37c6fc02b7cac", "detected_licenses": [ "MIT" ], "directory_id": "4d79e052b8b275371d1275642c417d7edae72985", "extension": "py", "file...
2.328125
stackv2
from flask import Flask, render_template, request, redirect, url_for, session from flaskext.mysql import MySQL import pymysql import re import sendgrid import os from sendgrid.helpers.mail import Mail, Email, To, Content app = Flask(__name__) mysql = MySQL() app.secret_key = '1a2b3c4d5e' app.config['MYSQL_DATABASE_...
123
38.8
124
17
1,112
python
[{"finding_id": "codeql_py/flask-debug_1ede4dfbc7714294_eab354fa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-1333" ]
[ "py/flask-debug", "py/polynomial-redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'." ]
[ 123, 74 ]
[ null, null ]
[ 5, 50 ]
[ 40, 55 ]
2024-11-18T22:41:05.036876+00:00
1,620,593,293,000
92bf3853c240fa79f0fc9264f17b882945cbfddb
3
{ "blob_id": "92bf3853c240fa79f0fc9264f17b882945cbfddb", "branch_name": "refs/heads/main", "committer_date": 1621951863000, "content_id": "4e9ab054af880f59ae98b4f74ee3ecaf34db62de", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c1aa5704883d924cf381a88c7164ba7d4da22780", "extension": "py"...
2.890625
stackv2
#%% import requests res = requests.get('https://scotch.io') print(res) # %% py_list = ['Bob', 'Anne', 'Joe'] py_tuple = ('Bob', 'Anne', 'Joe') py_set = {'Bob', 'Anne', 'Joe'} # %% print(py_list[0]) print(py_tuple[0]) print(py_set) # %% py_list.append('John') print(py_list) # %% py_list_ext = ['Mike', 'Samuel'] py_l...
111
17.21
82
14
599
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a2457eb50306c4b_f0281e88", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 70 ]
[ null ]
[ 11 ]
[ 24 ]
2024-11-18T22:41:16.735752+00:00
1,614,024,154,000
7f29a0ab59add1402ea943dbb6c9a8dec0b43e58
3
{ "blob_id": "7f29a0ab59add1402ea943dbb6c9a8dec0b43e58", "branch_name": "refs/heads/master", "committer_date": 1614024154000, "content_id": "48504feedf9b8d8c148c47db0b9eabedd33f6ae9", "detected_licenses": [ "MIT" ], "directory_id": "203c647cf6ac13abe1a5a4363d4c9640bdf534c2", "extension": "py", "fi...
2.71875
stackv2
"""provides control endpoints and serves visual state of a simulation model""" import logging import os from casymda.visualization.web_server.sim_controller import ( RunnableSimulation, SimController, ) from flask import Flask, request, send_file, send_from_directory from flask_cors import CORS logging.getLo...
90
31.66
86
16
593
python
[{"finding_id": "codeql_py/flask-debug_08d9f0cb7920cb40_6bcc05dc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 84, 46 ]
[ null, null ]
[ 9, 34 ]
[ 71, 42 ]
2024-11-18T22:54:18.123893+00:00
1,493,823,633,000
084e91ecc598d69215d79e42c305663ab801eeb6
3
{ "blob_id": "084e91ecc598d69215d79e42c305663ab801eeb6", "branch_name": "refs/heads/master", "committer_date": 1493823633000, "content_id": "840f10ef50d34ebfdbb76462ce0f7d027d512f6e", "detected_licenses": [ "MIT" ], "directory_id": "fb79629ece38f575d423e58f8dc92bf571819116", "extension": "py", "fi...
2.578125
stackv2
from selenium import webdriver from selenium.webdriver.common.keys import Keys import time import requests class TeamcityWebGui(object): def __init__(self, teamcityURL, username, password): """ Teamcity WEB GUI object :param teamcityURL: e.g. https://teamcity.example.com :param use...
111
30.14
115
18
728
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d98180e797498ec_be6ab71b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 53, 93, 81 ]
[ null, null, 87 ]
[ 15, 15, 13 ]
[ 98, 35, 10 ]
2024-11-18T22:54:29.241956+00:00
1,633,953,222,000
b0fa48431286e65ff91b46d82a93513fdc829506
2
{ "blob_id": "b0fa48431286e65ff91b46d82a93513fdc829506", "branch_name": "refs/heads/main", "committer_date": 1633953222000, "content_id": "22c2c2d672e8129535952627718fbc8c6e7d8c15", "detected_licenses": [ "MIT" ], "directory_id": "128bf2eb236ef978533aa1d4eeb0863a5a65611e", "extension": "py", "file...
2.375
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- """ .. module:: __init__ :synopsis: module that contains templating related classes. """ import copy import logging import threading from os import environ from jinja2 import Environment, StrictUndefined from jinja2.exceptions import TemplateSyntaxError, UndefinedError ...
238
29.42
102
19
1,517
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_eb8024e289ead576_3e42502b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 95 ]
[ null ]
[ 15 ]
[ 71 ]
2024-11-18T22:54:31.132465+00:00
1,387,533,666,000
4acccc23db8337ca60680fc80c48d5d9fce7c286
2
{ "blob_id": "4acccc23db8337ca60680fc80c48d5d9fce7c286", "branch_name": "refs/heads/master", "committer_date": 1387533666000, "content_id": "5fe2124e94d02e3c18789896ba2a16b00f5ccfc4", "detected_licenses": [ "MIT" ], "directory_id": "1e4d78d0788a9ddea8c55e3a3dde484aa2ba04ea", "extension": "py", "fi...
2.5
stackv2
# encoding:utf-8 import codecs import json import urllib from urllib2 import Request, urlopen import sys __author__ = 'zhouqi' verified_type_dict_str = u''' -1 屌丝 0 名人 1 政府 2 企业 3 媒体 4 校园 5 网站 6 应用 7 团体(机构) 8 待审企业 200 初级达人 220 中高级达人 400 已故V用户 10 微女郎 ''' verified_type_dict = dict([e.split(' ') for e in verified_type_...
89
25.38
112
15
732
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f77fc5cab679376_673aeabb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 78 ]
[ null ]
[ 17 ]
[ 22 ]
2024-11-18T21:33:00.634531+00:00
1,692,920,755,000
3241813302674be5ea109362ae1771d37f5baa1a
2
{ "blob_id": "3241813302674be5ea109362ae1771d37f5baa1a", "branch_name": "refs/heads/main", "committer_date": 1692920755000, "content_id": "ff4a8d52a11661fbeb7ab22f13da99237ee4b7d9", "detected_licenses": [ "MIT" ], "directory_id": "057587afaa374a33eb8a0de0344b13fa6cd44fb4", "extension": "py", "file...
2.34375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4 """Bintray Package info update This Conan hook reads your recipe and updates its Bintray package info using the attributes. It's necessary pass Bintray login by environment variables: - BINTRAY_LOGIN_USERNAME: Bintr...
290
35.72
98
19
2,440
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a8016c58a6e58a08_a360b1a8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 166 ]
[ null ]
[ 12 ]
[ 47 ]
2024-11-18T21:33:01.288550+00:00
1,618,542,677,000
da3b3f8c2cd70f441ae8c5460128d8696306a743
3
{ "blob_id": "da3b3f8c2cd70f441ae8c5460128d8696306a743", "branch_name": "refs/heads/master", "committer_date": 1618542677000, "content_id": "ff02fb01d162891eb1335e5fe13b4a673d14655a", "detected_licenses": [ "MIT" ], "directory_id": "04051972311325ba18526ba082fec24e010f546b", "extension": "py", "fi...
2.640625
stackv2
import hmac import logging from rest_framework.viewsets import ViewSet from rest_framework.parsers import JSONParser from rest_framework.response import Response from rest_framework.status import HTTP_200_OK, HTTP_500_INTERNAL_SERVER_ERROR, HTTP_403_FORBIDDEN, HTTP_400_BAD_REQUEST from pss_project.api.github_integrat...
94
43.5
119
18
852
python
[{"finding_id": "codeql_py/stack-trace-exposure_6970b9c71d5b7528_693c2cee", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1)." ]
[ 70, 50 ]
[ null, null ]
[ 29, 26 ]
[ 94, 66 ]
2024-11-18T21:33:15.438372+00:00
1,692,719,831,000
98e74092e798be96866237809d86bbfb54879d98
2
{ "blob_id": "98e74092e798be96866237809d86bbfb54879d98", "branch_name": "refs/heads/main", "committer_date": 1692719831000, "content_id": "cd68945babfb76826ef86ed84e41b5649ebde514", "detected_licenses": [ "Apache-2.0" ], "directory_id": "458d2e2131ab57bb95933b0d200b47828aef1fee", "extension": "py", ...
2.46875
stackv2
import logging import re import inspect from flask import request, abort, redirect from functools import wraps from .language import DEFAULT_LANGUAGE, LANGUAGE_MAPPING from .config import ( SUPPORTED_YEARS, DEFAULT_YEAR, SUPPORTED_CHAPTERS, SUPPORTED_LANGUAGES, ) TYPO_CHAPTERS = { "http-2": "http...
173
34.03
100
18
1,348
python
[{"finding_id": "codeql_py/url-redirection_08c3bbceb75e5356_144a9079", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
6
true
[ "CWE-601", "CWE-601", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/url-redirection", "py/url-redirection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](...
[ 51, 61, 153, 160, 165, 169 ]
[ null, null, null, null, null, null ]
[ 33, 33, 23, 31, 23, 31 ]
[ 49, 78, 68, 85, 81, 85 ]
2024-11-18T21:33:23.490303+00:00
1,577,632,423,000
a8153ed475610ffb2bb254f8268cf989738def27
3
{ "blob_id": "a8153ed475610ffb2bb254f8268cf989738def27", "branch_name": "refs/heads/master", "committer_date": 1577632423000, "content_id": "3f9cb03865f8d4fa0b5e5a8385c38fb60d7b0d4f", "detected_licenses": [ "MIT" ], "directory_id": "659a886cd521804c8fdc512f55a1172bc166bb9f", "extension": "py", "fi...
3.34375
stackv2
# Secure Container # It is a 6 digit number # Value is within 284639 and 748759 # Two adjacent digits are the same # From left to right digits never decrease start = 284639 end = 748759 def digits_do_not_decrease(digits): for i in range(len(digits)-1): if digits[i+1] < digits[i]: return False ...
89
26.66
88
13
657
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a0537b426a21a06_634d6c33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 42 ]
[ null ]
[ 11 ]
[ 17 ]